On Oct 16, 2012, at 5:34 PM, Shane Kerr wrote: > Even trickier is to protect against an internal conspiracy, but I don't think > anyone is really seriously worried about that threat.
You don't need an internal conspiracy when organizations are penetrated through and through with botnets which can capture, log, and steal just about anything. I understand the performance angle. At best, the HSM is security posture-neutral; but, like Randy, I suspect their are side-channel and OoB issues which may well make it security posture-negative. We don't really *know*, because no one's published a thorough analysis. ----------------------------------------------------------------------- Roland Dobbins <[email protected]> // <http://www.arbornetworks.com> Luck is the residue of opportunity and design. -- John Milton _______________________________________________ dns-operations mailing list [email protected] https://lists.dns-oarc.net/mailman/listinfo/dns-operations dns-jobs mailing list https://lists.dns-oarc.net/mailman/listinfo/dns-jobs
